首页 | 本学科首页   官方微博 | 高级检索  
     


Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks
Authors:Stéphanie Delaune  Florent Jacquemard
Affiliation:(1) LSV, ENS de Cachan & CNRS, France Télécom R&D, 61 avenue du Président Wilson, 94235 Cachan Cedex, France;(2) LSV, ENS de Cachan & CNRS, INRIA Futurs, Project SECSI, Cachan Cedex, France
Abstract:We consider the problem of formal automatic verification of cryptographic protocols when some data, like poorly chosen passwords, can be guessed by dictionary attacks. First, we define a theory of these attacks and propose an inference system modeling the deduction capabilities of an intruder. This system extends a set of well-studied deduction rules for symmetric and public key encryption, often called Dolev–Yao rules, with the introduction of a probabilistic encryption operator and guessing abilities for the intruder. Then, we show that the intruder deduction problem in this extended model is decidable in PTIME. The proof is based on a locality lemma for our inference system. This first result yields to an NP decision procedure for the protocol insecurity problem in the presence of a passive intruder. In the active case, the same problem is proved to be NP-complete: we give a procedure for simultaneously solving symbolic constraints with variables that represent intruder deductions. We illustrate the procedure with examples of published protocols and compare our model to other recent formal definitions of dictionary attacks.
Keywords:verification  cryptographic protocols  formal methods  dictionary attacks  probabilistic encryption
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号